Video Steganography Using MATLAB
Video Steganography Using MATLAB
1
Alumni.Dept.of TCE,BMSCE
2
Alumni.Dept.of TCE,BMSCE
3
Alumni.Dept.of TCE,BMSCE
4
Alumni.Dept.of TCE,BMSCE
5
Assistant Professor, BMS college of Engineering,Bangalore-19
Abstract
This paper discusses a Video Steganographic scheme that can provide approvable security with high computing speed, by
embedding data in video frames. The technique of embedding data in a video file by using LSB before which the secret
information is encrypted using symmetric XOR operation, thereby providing two layers of security. Data Hiding and
Extraction procedure are experimented successfully. All experiments are done using Matlab 2010a simulation software.
This method proves to be more efficient than other methods with the amount of data that can be embedded in it, showing a
PSNR of above 30 dB.
Copyright © 2017 Paramesh.G et al., licensed to EAI. This is an open access article distributed under the terms of the
Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use,
distribution and reproduction in any medium so long as the original work is properly cited.
doi: 10.4108/eai.20-12-2017.153493
1. Introduction
*
Corresponding author. Email:[email protected]
Message is the data that the sender wishes to remain it i. Non-uniform rectangular partition
confidential. It can be plain text, cipher text, other image, ii. Tri-way Pixel value Differencing
or anything that can be embedded in a bit stream such as a
copyright mark, a covert communication, or a serial iii. Adaptive scheme for compressed video
number. Password is known as stego-key, which ensures steganography
that only recipient who knows the corresponding decoding iv. LSB substitution using differential polynomial
key will be able to extract the message from a cover- equations
object. The cover-object with the secretly embedded
message is then called the stego-object. v. Vector quantization of DCT
C. Software used differentiate between the cover image and the stegoimage
progressively. A
A very large (and growing) database of built-in
PSNR value of less than 30 dB would indicate a human
algorithms for image processing and computer
vision applications. ability to notice the quality degradation.
By using the above equations and getting the
MATLAB allows you to test algorithms number of pixels at each level from the histogram of the
immediately without recompilation. You cantype cover and stegoimage as shown , we have
something at the command line or execute a
section in the editor and immediately see the
results, greatly facilitating algorithm
development. As we see the PSNR value is greater than 30 db
which indicate that human visual system cannot
The MATLAB Desktop environment, which differentiate between cover image and stegoimage.
allows you to work interactively with your data,
helps you to keep track of files and variables, and
simplifies common programming/debugging
tasks. The ability to read in a wide variety of both
common and domain-specific image formats.
The ability to call external libraries, such as
OpenCV. Clearly written documentation with
many examples, as well as online resources such
as web seminars ("webinars").
The ability to auto-generate C code, using
MATLAB Coder, for a large (and growing)
subset of image processing and mathematical
functions, which you could then use in other
environments, such as embedded systems or as a
component in other software. Figure. 8 Input Video
STEPS:
A. Performance Analysis
The input is an AVI (AUDIO VIDEO
These automated quality assessment techniques are INTERLEAVE) format
based on mathematical and computational algorithms to The duration of the video is 10 secs.
measure the accuracy of the perceived image. Most of the
recent objective quality assessment techniques are based
on computing the quality of the image with the original
image. Here we compare the accuracy of the cover image
with the stegoimage using two techniques,ie.,Mean Square
Error(MSE) and Peak Signal to Noise Ratio(PSNR).
Where R is the dynamic range of pixel The input is in the “.txt format”
values(R=255 for gray scale images).PSNR gives the The input message can be alphabet, number and
value infinity under one condition only; that is when the special character.
cover image is compared to itself.
Otherwise if the PSNR result is greater than 30 dB ,
then the human visual system would not be able to
decryption.
Enter the encryption key in the range 0-255.
The text is encrypted using the key.
Steps to start decoding process:
Stegovideo is choosen.
The text is extracted and decrypted from the frame using the key.
Same frame number must be entered as used in encryption process.
Also decryption key must be same as encryption key.
We must give the name of the folder where result will be store as “.txt” format.
The recovered text is saved in the specified folder.
References
[1] Yadav, P.; Mishra, N.; Sharma, S., "A secure video
steganography
with encryption based on LSB technique," Computational
Intelligence and Computing Research (ICCIC), 2013
IEEE International Conference on , vol., no., pp.1,5, 26-
28 Dec. 2013.
[2] Balaji, R. “Secure data transmission using video
Figure. 14 Recovered text file is saved as,”.txt”in a Steganography” IEEE International Conference on
specified folder Electro/Information Technology (EIT), 2011, pp. 1 – 5.
[3]Cryptography and Network security-Principles and
CONCLUSION
Practice: William Stallings, ThirdEdition. Fundamentals
With the growth in digital media, data security has of image processing by Rafeal C. Gonzalez and Richard
become a major concern. Mere steganography is not a E. Woods,second edition. Pearson edition inc.
good solution to secrecy nor is mere encryption but a [4]Mozo AJ., and Obien M.E., C.J. Rigor, “Video
combination of both provide a powerful tool which Steganography using Flash Video (FLV)” I2MTC 2009 -
enables people to communicate without possible International Instrumentation and Measurement
eavesdroppers even knowing there is a form of Technology Conference Singapore, 5-7 May 2009.
communication in the first place.
In this project we have presented two levels of [5]Kelash, H.M., Abdel Wahab, O.F., Elshakankiry, O.A.,
security for communicating secret information. Video and El-sayed, H.S., Hiding data in video sequences using
steganography proves to be more efficient than other steganography algorithms, in Proceedings of International
steganographic methods with the amount of data that can Conference on CT Convergence (ICTC), 2013, DOI-
be embedded in it. The text is encrypted prior embedding 10.1109/ICTC.2013.6675372, pp:353-358.
in the video thus increasing the security of information.
Since the text is embedded by modifying only the least
significant bit, no much change in the intensity of the
image is noticeable. The calculated PSNR obtained above
30 dB verifies this.
For an intruder to steganalyse and decrypt the
information he/she must have the knowledge of various
parameters, which include the frame in which the
information or data is hidden and the encryption key.
The future work mainly focuses on audio-video
steganography with chaotic algorithm and reversible data
hiding mechanism. Through reversible data hiding
method the exact image and data can be retrieved along
with the cover video and audio. The audio and video
quality can also be preserved. The reversible data hiding
method is mainly based on interpolation and error
prediction mechanism.
Acknowledgments